Page 228 - Privacy in a Cyber Age Policy and Practice
P. 228

216  NOTES

             3.  I have previously discussed this balance in the context of privacy and pub-
              lic health, public safety, sex offenders, and freedom of the press, among other
              rights. See Amitai Etzioni, The Limits of Privacy (New York: Basic Books, 1999);
              “The Privacy Merchants: What Is To Be Done?” Journal of Constitutional Law
              14, 4 (2012): 929–51; and How Patriotic Is the Patriot Act?: Freedom Versus
              Security in the Age of Terrorism (NY: Routledge, 2004).
             4.  Gerald Gaus and Shane D. Courtland, “Liberalism,” in Edward N. Zalta (ed.),
              The Stanford Encyclopedia of Philosophy (Spring 2011 Edition), http://plato.
              stanford.edu/entries/liberalism/. See also, John Rawls, A Theory of Justice
              (Cambridge, MA: Belknap Press, 1999).
            5.  Amitai Etzioni, “Communitarianism,” Encyclopædia Britannica, Online
              Academic Edition, http://www.britannica.com/EBchecked/topic/1366457/
              communitarianism.
             6.  For a broader discussion of this strand of communitarianism, see Russell A.
              Fox, “Confucian and Communitarian Responses to Liberal Democracy,” The
              Review of Politics 59, 3 (1997): 561–92. See also, Daniel Bell, “Daniel Bell on
              Confucianism and Free SpeechSpeech,” audio interview with Free Speech
              Debate, (February 16, 2012), http://freespeechdebate.com/en/media/daniel-
              bell-on-confucianism-free-speech/; and Francis Fukuyama, “Confucianism
              and Democracy,” Journal of Democracy 6, 2 (1995): 20–33.
             7.  Jed Rubenfeld, “The Right of Privacy,” Harvard Law Review 102, 4 (1989): 740.
              The development of a right to privacy with respect to torts dates back a bit
              further to 1890 with the publication of Warren and Brandeis’s “The Right to
              Privacy.” See Richard A. Posner, “The Right of Privacy,” Georgia Law Review
              12, 3 (1978): 409.
              See also Samuel D. Warren and Louis D. Brandeis, “The Right to Privacy,” Har-
              vard Law Review 4, 5 (1890): 193–220.
              The exact emergence of the notion of a Constitutional right to privacy is a bit
              more difficult to exactly pinpoint. For more genealogy of constitutional right,
              see William M. Beaney, “The Constitutional Right to Privacy in the Supreme
              Court,” The Supreme Court Review (1962): 212–51.
            8.  Anthony Lewis, Freedom for the Thought We Hate: A Biography of the First
              Amendment (New York: Basic Books, 2007), 23.
            9.  Black’s Law Dictionary, “What Is the Public Interest?” Black’s Free Online Legal
              Dictionary, 2nd ed., available at http://thelawdictionary.org/public-interest/.
           10.  See, for example, United States v. Hartwell, 436 F.3d 174, 180 (3d Cir. Pa. 2006);
              Skinner v. Railway Labor Executives’ Association, 489 U.S. 602 (1989); and
              National Treasury Employees Union v. Von Raab, 489 U.S. 656 (1989).
           11.  New York Times Co. v. United States, 403 U.S. 713 (1971).
           12.  United States v. Hartwell, 436 F.3d 174, 180 (3d Cir. Pa. 2006).
           13.  See, for example, Bruce Schneier, “It’s Smart Politics to Exaggerate Terror-
              ist Threats,”  CNN, May 20, 2013, http://www.cnn.com/2013/05/20/opinion/
              schneier-security-politics/index.html.
           14.  See, for example, Randy E. Barnett, “The NSA’s Surveillance Is Unconstitutional,”
              The Wall Street Journal, July 11, 2013, http://online.wsj.com/article/SB100014
   223   224   225   226   227   228   229   230   231   232   233